Search criteria
6 vulnerabilities found for acmailer_db by acmailer
FKIE_CVE-2021-20617
Vulnerability from fkie_nvd - Published: 2021-01-14 09:15 - Updated: 2024-11-21 05:46
Severity ?
Summary
Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN35906450/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.acmailer.jp/info/de.cgi?id=101 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN35906450/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.acmailer.jp/info/de.cgi?id=101 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| acmailer | acmailer | * | |
| acmailer | acmailer_db | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:acmailer:acmailer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D103A485-F353-4EFB-A9B8-A6AB0347DB8D",
"versionEndIncluding": "4.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:acmailer:acmailer_db:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6A96DA-719B-44EC-81E9-9CAF9A5C410F",
"versionEndIncluding": "1.1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
},
{
"lang": "es",
"value": "Una vulnerabilidad de control de acceso inapropiado en acmailer versiones ver.\u0026#xa0;4.0.1 y anteriores, y acmailer DB versiones ver.\u0026#xa0;1.1.3 y anteriores, permiten a atacantes remotos ejecutar un comando arbitrario del Sistema Operativo y alcanzar un privilegio administrativo que puede resultar en la obtenci\u00f3n de informaci\u00f3n confidencial en el servidor por medio de vectores no especificados"
}
],
"id": "CVE-2021-20617",
"lastModified": "2024-11-21T05:46:53.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-14T09:15:13.367",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-20618
Vulnerability from fkie_nvd - Published: 2021-01-14 09:15 - Updated: 2024-11-21 05:46
Severity ?
Summary
Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN35906450/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.acmailer.jp/info/de.cgi?id=101 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN35906450/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.acmailer.jp/info/de.cgi?id=101 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| acmailer | acmailer | * | |
| acmailer | acmailer_db | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:acmailer:acmailer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E22335A-B970-443E-BE48-83D29D4B02EA",
"versionEndIncluding": "4.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:acmailer:acmailer_db:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53E9A059-D02B-409B-81EB-DB11CEFE523C",
"versionEndIncluding": "1.1.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
},
{
"lang": "es",
"value": "Una vulnerabilidad de encadenamiento de privilegios en acmailer versiones ver.\u0026#xa0;4.0.2 y anteriores, y acmailer DB versiones ver.\u0026#xa0;1.1.4 y anteriores, permiten a atacantes remotos omitir la autenticaci\u00f3n y alcanzar un privilegio administrativo que puede resultar en la obtenci\u00f3n de informaci\u00f3n confidencial en el servidor por medio de vectores no especificados"
}
],
"id": "CVE-2021-20618",
"lastModified": "2024-11-21T05:46:53.300",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-14T09:15:13.740",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-20618 (GCVE-0-2021-20618)
Vulnerability from cvelistv5 – Published: 2021-01-14 08:20 – Updated: 2024-08-03 17:45
VLAI?
Summary
Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- Privilege chaining
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Seeds Co.,Ltd. | acmailer and acmailer DB |
Affected:
acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:45:44.743Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "acmailer and acmailer DB",
"vendor": "Seeds Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Privilege chaining",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-14T08:20:17",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2021-20618",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "acmailer and acmailer DB",
"version": {
"version_data": [
{
"version_value": "acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier"
}
]
}
}
]
},
"vendor_name": "Seeds Co.,Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Privilege chaining"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.acmailer.jp/info/de.cgi?id=101",
"refsource": "MISC",
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"name": "https://jvn.jp/en/jp/JVN35906450/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2021-20618",
"datePublished": "2021-01-14T08:20:17",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-08-03T17:45:44.743Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20617 (GCVE-0-2021-20617)
Vulnerability from cvelistv5 – Published: 2021-01-14 08:20 – Updated: 2024-08-03 17:45
VLAI?
Summary
Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- Improper access control
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Seeds Co.,Ltd. | acmailer and acmailer DB |
Affected:
acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:45:44.798Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "acmailer and acmailer DB",
"vendor": "Seeds Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper access control",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-14T08:20:16",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2021-20617",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "acmailer and acmailer DB",
"version": {
"version_data": [
{
"version_value": "acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier"
}
]
}
}
]
},
"vendor_name": "Seeds Co.,Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper access control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.acmailer.jp/info/de.cgi?id=101",
"refsource": "MISC",
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"name": "https://jvn.jp/en/jp/JVN35906450/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2021-20617",
"datePublished": "2021-01-14T08:20:16",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-08-03T17:45:44.798Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20618 (GCVE-0-2021-20618)
Vulnerability from nvd – Published: 2021-01-14 08:20 – Updated: 2024-08-03 17:45
VLAI?
Summary
Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- Privilege chaining
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Seeds Co.,Ltd. | acmailer and acmailer DB |
Affected:
acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:45:44.743Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "acmailer and acmailer DB",
"vendor": "Seeds Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Privilege chaining",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-14T08:20:17",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2021-20618",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "acmailer and acmailer DB",
"version": {
"version_data": [
{
"version_value": "acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier"
}
]
}
}
]
},
"vendor_name": "Seeds Co.,Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Privilege chaining"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.acmailer.jp/info/de.cgi?id=101",
"refsource": "MISC",
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"name": "https://jvn.jp/en/jp/JVN35906450/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2021-20618",
"datePublished": "2021-01-14T08:20:17",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-08-03T17:45:44.743Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20617 (GCVE-0-2021-20617)
Vulnerability from nvd – Published: 2021-01-14 08:20 – Updated: 2024-08-03 17:45
VLAI?
Summary
Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- Improper access control
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Seeds Co.,Ltd. | acmailer and acmailer DB |
Affected:
acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:45:44.798Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "acmailer and acmailer DB",
"vendor": "Seeds Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper access control",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-14T08:20:16",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2021-20617",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "acmailer and acmailer DB",
"version": {
"version_data": [
{
"version_value": "acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier"
}
]
}
}
]
},
"vendor_name": "Seeds Co.,Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper access control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.acmailer.jp/info/de.cgi?id=101",
"refsource": "MISC",
"url": "https://www.acmailer.jp/info/de.cgi?id=101"
},
{
"name": "https://jvn.jp/en/jp/JVN35906450/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN35906450/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2021-20617",
"datePublished": "2021-01-14T08:20:16",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-08-03T17:45:44.798Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}